Information security capability evaluation method and system based on mobile terminal behaviors

An information security and mobile terminal technology, applied in the field of information security capability evaluation based on mobile terminal behavior, can solve the problems that users do not have a good warning function, cannot make publicity and education in a timely manner, and are inconvenient for actual use, etc., to improve information security. Safety capabilities, authenticity of evaluation results, and effects of good warning functions

Pending Publication Date: 2020-12-22
恩善(厦门)信息科技有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides an information security capability evaluation method and system based on mobile terminal behavior, which can make the evaluation of the entire evaluation system more objective and accurate, the evaluation results are more real, and it has a good information security ability to warn functions, and can provide relevant education to users in a timely manner, has a good guiding role, effectively improves the user's information security capabilities, and solves the current lack of information security capability evaluation for mobile terminal behavior information, which is not useful for users It has a good warning function, but it cannot make timely publicity and education to improve the information security of users, and it is not convenient for actual use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] A method for evaluating information security capabilities based on mobile terminal behavior, comprising the following steps:

[0034] Step 1: Establish an overall information security capability evaluation data model

[0035] a. Collect multiple historical behavior data samples based on big data, and uniformly organize them into the behavior information database according to the security of the historical behavior data samples;

[0036] b. According to the collected historical behavior data samples, the information security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security capability evaluation, and discloses an information security capability evaluation method based on mobile terminal behaviors, whichcomprises the following steps: establishing an overall information security capability evaluation data model; collecting behavior information used by a user in the mobile terminal in real time basedon the mobile terminal; inputting the collected behavior information into an information security capability evaluation data model, and matching to obtain a historical behavior sample most correspondingly; matching and corresponding to corresponding evaluation information in a behavior evaluation database by using information matching according to the matched historical behavior sample, and outputting an information security capability evaluation result corresponding to the acquired behavior information. According to the information security capability evaluation method and system based on themobile terminal behaviors, the evaluation of the whole evaluation system is more objective and accurate, the evaluation result is more real, and the method and system have very good information security and a warning function.

Description

technical field [0001] The invention relates to the technical field of information security capability evaluation, in particular to a mobile terminal behavior-based information security capability evaluation method and system. Background technique [0002] Information security capability is an indispensable basic capability in the rapid development of science and technology. The mobile Internet is the product of the combination of communication network and Internet, which has the characteristics of wireless and portable. Mobile terminals are devices that use the mobile Internet, so mobile terminals are open source and open. As the most popular device among the masses, mobile terminal devices can reflect the user's information security capabilities to a large extent. In recent years, security incidents such as stolen funds and privacy leaks have occurred frequently, seriously threatening the safety of people's lives and property. In order to avoid security incidents, it is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 陈经途
Owner 恩善(厦门)信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products